Policy-as-Code Competitive Analysis

Policy-as-Code Competitive Analysis

This page describes the Policy as Code landscape. We presume that the reader is already familiar with the basics of Policy as Code, and the problems that it solves. However, what is not clear is the relative capabilities of the systems that offer Policy as Code and related capabilities, especially given the evolving nature of the industry. 


Note that this information is correct as of the time it was written, but evolutions in the offerings from these companies will naturally make some of it less accurate over time. 

This page describes the Policy as Code landscape. We presume that the reader is already familiar with the basics of Policy as Code, and the problems that it solves. However, what is not clear is the relative capabilities of the systems that offer Policy as Code and related capabilities, especially given the evolving nature of the industry. 


Note that this information is correct as of the time it was written, but evolutions in the offerings from these companies will naturally make some of it less accurate over time. 

Evaluation 

Evaluation 

The key challenge in an analysis of the PaC space is the relative maturity, scope, and purpose of the various offerings. Larger customers will typically want robust, well-managed and broad capabilities, while smaller customers may want more specific solutions. This document was organized across these different axes:


Maturity & Scope

  • Which solutions were meant for large-scale customers with extensive support for management, operations, workflows, support and services?


Distributed vs Centralized

  • Centralized solutions maintain the decisions centrally, requiring calls across the network to get answers.

  • Distributed solutions keep the PDPs (Policy Decision Points) close to the applications and services that need them, significantly reducing network latency.


Platform Attachment

  • Some products will only work within a particular product ecosystem, so if you don’t use that ecosystem, it’s much more difficult (if not impossible) to use that product.

Organization  

Organization  

Using these axes, we divide up the major vendors into key buckets: 


  • Mature, Platform-Neutral Distributed Solutions 

  • Mature, Platform-Neutral Centralized Solutions 

  • Platform-Neutral Distributed Rising Stars 

  • Platform-Neutral Centralized Rising Stars 

  • Platform-Specific Solutions 


We describe how various offerings fit into these buckets and then provide a series of comparison tables for various aspects of the solutions.

Mature, Platform-Neutral Distributed Solutions   

Mature, Platform-Neutral Distributed Solutions   

Styra DAS¹


  • OPA is by far the most flexible policy solution, offering capabilities far beyond just access control (such as infrastructure security, data transformation & validation, arbitrary other policies with variable inputs/outputs). For the purposes of a consistent enterprise-wide compliance solution, Styra DAS-managed OPAs are the best choice.


PlainID


  • PlainID offers centralized management of authorization policy and distributed PDPs and distributes the policies to PDPs out in the network. PlainID offers a business-friendly front-end for building policies, but it is customized for yes/no access control decisions. If you need a comprehensive compliance solution for infrastructure, access control, CI/CD security, Data protection, &etc, PlainID requires extensive customization, and you will spend a lot of time “fighting” with the system.


¹ Styra DAS is winding down operations and is not accepting new customers.

Mature, Platform-Neutral Centralized Solutions   

Mature, Platform-Neutral Centralized Solutions   

Axiomatics


  • XACML-based solution with strong adoption in regulated industries. Focused on access control and not designed for infrastructure or operational policies. In addition, as a centralized solution, it is not well-positioned to offer access control for microservices, Zero Trust implementations, etc.


NextLabs 


  • Like Axiomatics, NextLabs uses XACML for centralized access control. It is heavily used in regulated industries for protecting Intellectual Property. As a centralized solution, it has the same drawbacks as Axiomatics.


Platform-Neutral Distributed Rising Stars   

Platform-Neutral Distributed Rising Stars   

Permit.io 


  • Permit uses OPA as part of its PDP solution, but it (like most others) exclusively focuses on Access Control. So (like most of the others) not a generalized policy solution for infrastructure compliance, security review, CI/CD analysis, etc.


EnforceAuth 


  • EnforceAuth was founded by Styra veterans as Styra was being shut down. They are stepping into the space left by Styra, offering a solution that allows customers to reuse their existing OPA infrastructure. This makes EnforceAuth’s offerings more flexible for compliance, infrastructure security and data protection, while simultaneously offering fast, local access control decisions as well.


Cerbos Cloud


  • Cerbos offers a custom PDP that uses YAML as its policy language. Like most other providers, it is focused on access control.


Oso


  • Oso provides a custom policy language (Polar) and is designed to be an SDK that is embedded directly in your applications. In this model, it is highly distributed, but as an embedded SDK, all the management is up to you. Oso Cloud is a hosted offering that takes over much of the management, but Oso Cloud is a centralized solution that requires network calls. In addition, Oso is focused on Access Control.

Platform-Neutral Centralized Rising Stars   

Platform-Neutral Centralized Rising Stars   

AuthZed 


  • AuthZed offers ReBAC (Relationship-based Access Control) and uses Google Zanzibar as its reference. For situations where relationship-based access control is critical, AuthZed is an excellent choice. Again, focused on Access Control. You can use SpiceDB (the open-source heart of AuthZed) as a distributed solution, but if you want a managed provider, it needs to be the centralized AuthZed.


Permify 


  • Permify is inspired by Zanzibar, but not a direct implementation. They are focused on smaller organizations but do offer an enterprise-grade service with unlisted pricing. Like other Zanzibar variants, they are exclusively focused on Access Control.

Platform-Specific Offerings   

Platform-Specific Offerings   

Okta FGA 


  • Okta FGA is the hosted version of OpenFGA, backed by Okta, a major player in the Identity space. It is also based on Google Zanzibar. Okta manages all the policies and decisions centrally. Exclusively for Access Control


AWS Verified Permissions (AVP)  


  • AVP is the AWS implementation of the Cedar policy language, and benefits from the rich ecosystem provided by Amazon. However, it must be centralized and must use the AWS infrastructure. It is also exclusively used for Access Control.


CyberArk Identity


  • Primarily focused on authentication. It supports Role-Based Access Control.


HashiCorp Sentinel


  • A Policy as Code solution for customers who use the HashiCorp ecosystem. It is not a general-purpose solution for Access Control.


SailPoint


  • SailPoint is primarily focused on identity management and offers some RBAC capabilities as part of that.

Comparison Tables   

Comparison Tables   

Policy Capabilities

² For example: complex business approval, data obscuration, data filtering

³ For example: data transformation, data aggregation, cert validation

² For example: complex business approval, data obscuration, data filtering

³ For example: data transformation, data aggregation, cert validation

IT Concerns

⁴ In other words, can a PDP still make decisions when the network has become segmented.

⁵ Typically, systems that support self-hosted can also provide air-gapped capabilities.

Bells and Whistles

⁶ This includes both controlling how AIs access your systems, as well as using AIs to help develop your rules. 

Need More Info?

Need More Info?

If you’d like to explore these options further, and would like our help in doing so, please feel free to reach out: johnbr@paclabs.io.


PACLabs also offers a 24/7 technical support helpdesk for Open Policy Agent (OPA), Enterprise OPA (EOPA) and the OPA Control Plane. Let us know if we can be of service.


For the most up-to-date information and insights, sign up for our Substack.


If you’d like to explore these options further, and would like our help in doing so, please feel free to reach out: johnbr@paclabs.io.


PACLabs also offers a 24/7 technical support helpdesk for Open Policy Agent (OPA), Enterprise OPA (EOPA) and the OPA Control Plane. Let us know if we can be of service.


For the most up-to-date information and insights, sign up for our Substack.


Resources

Migration

Case Study